The malicious use of encryption is soaring, as encrypted inbound and outbound network traffic accounts for nearly two-thirds of organizations' web connections today. Encryption protocols such as Transport Layer Security (TLS), Secure Sockets Layer (SSL), and Secure Shell (SSH) are now being used to hide cyber-attacks. Skillful criminals can successfully exploit vulnerabilities, push malware downloads, conduct command and control communications and steal data inside encrypted traffic while avoiding detection.
With this rise in attacks inside encrypted traffic, it is imperative for organizations to establish a security model that can decrypt and inspect encrypted traffic. This will help neutralize the danger of hidden threats. Otherwise, organizations are missing much of the value their security systems provide.